A Clash of Interests Over the Electronic Encryption Standard
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Jennifer Mankoff
185 Stevens Way Jennifer Manko ff Seattle, WA, USA H +1 (412) 567 7720 B Richard E. Ladner Professor jmanko [email protected] Paul G. Allen School of Computer Science and Engineering Í make4all.org University of Washington jcmanko ff My research focuses on accessibility, health and inclusion. My work combines critical thinking and technological innovation. I strive to bring both structural and personal perspectives to my work. Integrating computational approaches with human-centered analytics, I develop tools that can influence energy saving behavior, provide support for individuals with chronic illnesses and design 3D-printed assistive technologies for people with disabilities. Education 2001 PhD, Georgia Institute of Technology, College of Computing , Atlanta, GA, Thesis Advisors Gregory Abowd and Scott Hudson. Thesis: “An architecture and interaction techniques for handling ambiguity in recognition based input” 1995 B.A., Oberlin College, Oberlin, OH, High Honors. Thesis Advisor: Rhys Price-Jones. Thesis: ”IIC: Information in context” Experience University of Washington 2017–present Richard E. Ladner Professor, Allen School, University of Washington 2020–present Aÿliate Faculty Member, Disability Studies, University of Washington 2020-present Adjunct Faculty Member, iSchool, University of Washington 2019–present Adjunct Faculty Member, HCDE, University of Washington Carnegie Mellon 2016–2017 Professor, HCI Institute, Carnegie Mellon, Pittsburgh, PA. 2015–2017 Aÿliate Faculty Member, ECE , Carnegie Mellon, Pittsburgh, PA. 2008-2016 Associate Professor, HCI Institute, Carnegie Mellon, Pittsburgh, PA. 2004–2008 Assistant Professor, HCI Institute, Carnegie Mellon, Pittsburgh, PA. Consulting and Sabbaticals 2014–2017 Consultant, Disney, Pittsburgh, PA. 2014–2017 Consultant, Cincinnati Children’s Hospital Medical Center , Cincinnati, OH. 2014–2017 Visiting Professor, ETH, Zrich, CH. -
Protocol Failure in the Escrowed Encryption Standard
Protocol Failure in the Escrowed Encryption Standard Matt Blaze AT&T Bell Laboratories [email protected] August 20, 1994 Abstract The proposal, called the Escrowed Encryption Stan- dard (EES) [NIST94], includes several unusual fea- The Escrowed Encryption Standard (EES) de¯nes tures that have been the subject of considerable de- a US Government family of cryptographic processors, bate and controversy. The EES cipher algorithm, popularly known as \Clipper" chips, intended to pro- called \Skipjack", is itself classi¯ed, and implemen- tect unclassi¯ed government and private-sector com- tations of the cipher are available to the private sec- munications and data. A basic feature of key setup be- tor only within tamper-resistant modules supplied by tween pairs of EES processors involves the exchange of government-approved vendors. Software implementa- a \Law Enforcement Access Field" (LEAF) that con- tions of the cipher will not be possible. Although Skip- tains an encrypted copy of the current session key. The jack, which was designed by the US National Security LEAF is intended to facilitate government access to Agency (NSA), was reviewed by a small panel of civil- the cleartext of data encrypted under the system. Sev- ian experts who were granted access to the algorithm, eral aspects of the design of the EES, which employs a the cipher cannot be subjected to the degree of civilian classi¯ed cipher algorithm and tamper-resistant hard- scrutiny ordinarily given to new encryption systems. ware, attempt to make it infeasible to deploy the sys- By far the most controversial aspect of the EES tem without transmitting the LEAF. -
Crypto Wars of the 1990S
Danielle Kehl, Andi Wilson, and Kevin Bankston DOOMED TO REPEAT HISTORY? LESSONS FROM THE CRYPTO WARS OF THE 1990S CYBERSECURITY June 2015 | INITIATIVE © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. AUTHORS Danielle Kehl, Senior Policy Analyst, Open Technology Institute Andi Wilson, Program Associate, Open Technology Institute Kevin Bankston, Director, Open Technology Institute ABOUT THE OPEN TECHNOLOGY INSTITUTE ACKNOWLEDGEMENTS The Open Technology Institute at New America is committed to freedom The authors would like to thank and social justice in the digital age. To achieve these goals, it intervenes Hal Abelson, Steven Bellovin, Jerry in traditional policy debates, builds technology, and deploys tools with Berman, Matt Blaze, Alan David- communities. OTI brings together a unique mix of technologists, policy son, Joseph Hall, Lance Hoffman, experts, lawyers, community organizers, and urban planners to examine the Seth Schoen, and Danny Weitzner impacts of technology and policy on people, commerce, and communities. -
Battle of the Clipper Chip - the New York Times
Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp... https://nyti.ms/298zenN Battle of the Clipper Chip By Steven Levy June 12, 1994 See the article in its original context from June 12, 1994, Section 6, Page 46 Buy Reprints VIEW ON TIMESMACHINE TimesMachine is an exclusive benefit for home delivery and digital subscribers. About the Archive This is a digitized version of an article from The Times’s print archive, before the start of online publication in 1996. To preserve these articles as they originally appeared, The Times does not alter, edit or update them. Occasionally the digitization process introduces transcription errors or other problems; we are continuing to work to improve these archived versions. On a sunny spring day in Mountain View, Calif., 50 angry activists are plotting against the United States Government. They may not look subversive sitting around a conference table dressed in T-shirts and jeans and eating burritos, but they are self-proclaimed saboteurs. They are the Cypherpunks, a loose confederation of computer hackers, hardware engineers and high-tech rabble-rousers. The precise object of their rage is the Clipper chip, offically known as the MYK-78 and not much bigger than a tooth. Just another tiny square of plastic covering a silicon thicket. A computer chip, from the outside indistinguishable from thousands of others. It seems 1 of 19 11/29/20, 6:16 PM Battle of the Clipper Chip - The New York Times https://www.nytimes.com/1994/06/12/magazine/battle-of-the-clipp.. -
Encryption Friction
ENCRYPTION FRICTION Christopher Babiarz INTRODUCTION The Supreme Court decision in Riley v. California reflects the fact that the Court is increasingly sensitive to the implications of new technologies in the lives of individuals and their subsequent impacts on reasonable expectations of privacy.1 This increased judicial awareness for the pervasive role that technology plays in our modern privacy suggests that in the future the Court would be more inclined to protect individual privacy rights and less inclined to force technology manufacturers to only provide broken encryption to users so that the government can enjoy unfettered access to protected data.2 Although encryption admittedly presents unique challenges to government interests in law enforcement and terrorism prevention, the proposed government solution undercuts and outweighs fundamental aspects of modern privacy.3 Given the Court’s demonstration of an increased awareness for modern privacy concerns, efforts by the government to undermine encryption should be dismissed by the Court in favor of individual privacy rights. Following an introduction to encryption generally, this paper begins with the rekindling of a privacy issue that Michael Froomkin wrote about in the mid-1990’s.4 The lack of a solidified judicial stance on this issue sets the stage for the modern encryption battle between the FBI and Apple, and the recent Supreme Court decision in Riley v. California illustrates a likelihood that the current Court is ready to finally take a position on this old debate.5 This paper argues that the Court should be 1 Riley v. California, 134 S. Ct. 2473 (2014). 2 Id. at 2484. -
The Clipper Chip Proposal: Deciphering the Unfounded Fears That Are Wrongfully Derailing Its Implementation, 29 J
UIC Law Review Volume 29 Issue 2 Article 8 Winter 1996 The Clipper Chip Proposal: Deciphering the Unfounded Fears That Are Wrongfully Derailing Its Implementation, 29 J. Marshall L. Rev. 475 (1996) Howard S. Dakoff Follow this and additional works at: https://repository.law.uic.edu/lawreview Part of the Constitutional Law Commons, Criminal Law Commons, Criminal Procedure Commons, Evidence Commons, Fourth Amendment Commons, and the Legislation Commons Recommended Citation Howard S. Dakoff, The Clipper Chip Proposal: Deciphering the Unfounded Fears That Are Wrongfully Derailing Its Implementation, 29 J. Marshall L. Rev. 475 (1996) https://repository.law.uic.edu/lawreview/vol29/iss2/8 This Comments is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Review by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. NOTES THE CLIPPER CHIP PROPOSAL: DECIPHERING THE UNFOUNDED FEARS THAT ARE WRONGFULLY DERAILING ITS IMPLEMENTATION INTRODUCTION Improvements in technology have reduced law enforcement's ability to conduct electronic surveillance of criminal activity.' Rather than rely on telephones to communicate with their accom- plices, criminals may increasingly use computers to perpetrate crimes.2 In response to these problems, law enforcement authori- ties have pushed for the implementation of new methods to im- prove the ability of law enforcement agencies to intercept criminal transmissions, while concurrently increasing the privacy of in- dividual citizens.3 The "Clipper Chip" was developed to address this objec- tive.4 This device is intended to alleviate law enforcement's re- duced ability to conduct electronic surveillance by allowing gov- ernment authorities, using proper methods, to intercept criminal transmissions.5 As planned, the Clipper Chip will achieve this by providing a mechanism for government authorities to decode en- crypted communications using so-called "key escrow" technology.6 1. -
Going Dark: Impact to Intelligence and Law Enforcement and Threat Mitigation
GOING DARK: IMPACT TO INTELLIGENCE AND LAW ENFORCEMENT AND THREAT MITIGATION Bonnie Mitchell Krystle Kaul G. S. McNamara Michelle Tucker Jacqueline Hicks Colin Bliss Rhonda Ober Danell Castro Amber Wells Catalina Reguerin Cindy Green-Ortiz Ken Stavinoha ACKNOWLEDGEMENTS We would like to first thank the Office of the Director of National Intelligence (ODNI) for its generous funding and support for our study and learning journey to the DEFCON hacking conference. We are also very grateful to the Department of Homeland Security (DHS) for its support during the duration of the program. We could not have completed this study without the unwavering support and dedication of Ms. Bonnie Mitchell, ODNI Deputy National Intelligence Manager for the Western Hemisphere and the Homeland, our devoted Team Champion who steered us throughout this study and helped turn an idea into a product. We would like to acknowledge and thank each member of our public-private sector working group for their tireless efforts from around the U.S., which includes Krystle Kaul, G. S. McNamara, Michelle Tucker, Jacqueline Hicks, Colin Bliss, Rhonda Ober, Danell Castro, Amber Wells, Catalina Reguerin, Cindy Green- Ortiz and Ken Stavinoha. We are very thankful for all the unique insight we received from interviewees who contributed to this report by educating our group on the many aspects of ‘going dark,’ and we take full responsibility for any and all errors of fact or interpretation implied or explicit in this paper. Our interviewees include the Village sponsors at DEF CON, private sector industry experts and government officials. We are thankful for the interesting and diverse perspectives particularly from senior government officials and private sector experts. -
Public-Key Encryption and the Clipper Chip: Implications for the Archival Administration of Electronic Records Nicholas J
PUBLIC-KEY ENCRYPTION AND THE CLIPPER CHIP: IMPLICATIONS FOR THE ARCHIVAL ADMINISTRATION OF ELECTRONIC RECORDS NICHOLAS J. SCALERA ABSTRACT: The advent of available, inexpensive powerful encryption software based on the virtually "uncrackable" RSA algorithms, coupled with the Clinton administration's response in the form of the Clipper Chip proposal, has pro- duced a heated public debate which extends far beyond technical issues to the very core of the constitutional rights and freedoms of American citizens. The ability which this technology offers to private citizens (or to governments, busi- nesses, and other institutions) of encrypting digitally communicated materials, with privacy protection unassailable by even the most sophisticated code-break- ing supercomputers of the National Security Agency, presents both serious threats and challenging opportunities to archivists already struggling with the management of electronic records. Thus, it is necessary for archivists to become aware of the nature and development of this powerful form of encryption, the government's response through the Clipper Chip proposal, and the associated issues of individual privacy and public security. Moreover, archivists should consider how encryption might be employed to facilitate the archival manage- ment of electronic records. L Introduction The recent emergence of public-key encryption, a technological encoding technique that is able to provide electronic communications and data with virtu- ally "uncrackable" security, entails both intriguing opportunities and daunting challenges for archivists attempting to deal with electronic records. On the one hand, encryption technology may be employed to enhance the ability of archivists to manage electronic records directly or to provide useful advice to programmers/systems administrators attempting to construct archivally-sound electronic record-keeping systems. -
The E-Government Act: Promoting E-Quality Or Exaggerating the Digital Divide?
THE E-GOVERNMENT ACT: PROMOTING E-QUALITY OR EXAGGERATING THE DIGITAL DIVIDE? In passing the E-Government Act of 2002, Congress has promised to improve the technological savvy of federal agencies and make more public forms and records available online. However, the question is whether doing so will alienate those Americans who do not have Internet access. Will the Act exaggerate the gap between the Internet haves and have-nots that is known as the digital divide? This iBrief identifies the e- quality issues arising from the E-Government Act and argues that implementation of the Act, however well intentioned, may exaggerate the digital divide. Introduction E-commerce has expanded dramatically in recent years. For example, in the third quarter of 2002 Internet purchases topped $11 billion, an increase of thirty-four percent from the same quarter in 2001.1 The explosion of online information and transactional capabilities is attributable to the benefits the Internet offers to both consumers and businesses. American consumers have become more comfortable with the virtual marketplace as they have learned that they can lower their search costs by using the Internet as a concentrated location for researching products, comparing prices, and making purchases. Likewise, businesses have found that the Internet can be a strong marketing tool, allowing them to save money by decreasing transaction costs and facilitating quick and easy dissemination of product information. Additionally, because websites can be accessed any time of the day, any day of the week, the traditional limitation of business hours no longer applies. The federal government has been slower than private industry in capitalizing on the benefits of e-commerce. -
CA - FACTIVA - SP Content
CA - FACTIVA - SP Content Company & Financial Congressional Transcripts (GROUP FILE Food and Drug Administration Espicom Company Reports (SELECTED ONLY) Veterinarian Newsletter MATERIAL) (GROUP FILE ONLY) Election Weekly (GROUP FILE ONLY) Health and Human Services Department Legal FDCH Transcripts of Political Events Military Review American Bar Association Publications (GROUP FILE ONLY) National Endowment for the Humanities ABA All Journals (GROUP FILE ONLY) General Accounting Office Reports "Humanities" Magazine ABA Antitrust Law Journal (GROUP FILE (GROUP FILE ONLY) National Institute on Alcohol Abuse and ONLY) Government Publications (GROUP FILE Alcoholism's Alcohol Research & ABA Banking Journal (GROUP FILE ONLY): Health ONLY) Agriculture Department's Economic National Institute on Drug Abuse NIDA ABA Business Lawyer (GROUP FILE Research Service Agricultural Outlook Notes ONLY) Air and Space Power Journal National Institutes of Health ABA Journal (GROUP FILE ONLY) Centers for Disease Control and Naval War College Review ABA Legal Economics from 1/82 & Law Prevention Public Health and the Environment Practice from 1/90 (GROUP FILE ONLY) CIA World Factbook SEC News Digest ABA Quarterly Tax Lawyer (GROUP FILE Customs and Border Protection Today State Department ONLY) Department of Energy Documents The Third Branch ABA The International Lawyer (GROUP Department of Energy's Alternative Fuel U.S. Department of Agricultural FILE ONLY) News Research ABA Tort and Insurance Law Journal Department of Homeland Security U.S. Department of Justice's -
United States Patent (10) Patent N0.: US 6,173,311 B1 Hassett Et Al
US006173311B1 (12) United States Patent (10) Patent N0.: US 6,173,311 B1 Hassett et al. (45) Date of Patent: *Jan. 9, 2001 (54) APPARATUS, METHOD AND ARTICLE OF FOREIGN PATENT DOCUMENTS MANUFACTURE FOR SERVICING CLIENT 0113022 11/1984 (EP) REQUESTS ON A NETWORK 0206565 12/1986 (EP) 2034995 6/1980 (GB) (75) Inventors: Gregory P. Hassett, Cupertino, CA 2141907 1/1985 (GB) (US); Harry Collins, South Orange, NJ 2185670 7/1987 (GB) (US); Vibha Dayal, Saratoga, CA (US) 2207314 1/1989 (GB) 2256549 12/1992 (GB) (73) Assignee: PointCast, Inc., Sunnyvale, CA (US) 2281434 3/1995 (GB) 88/04507 6/1988 (WO) ( * ) Notice: This patent issued on a continued pros 90/07844 7/1990 (WO) ecution application ?led under 37 CFR 92/12488 7/1992 (WO) 93/09631 5/1993 (WO) 1.53(d), and is subject to the tWenty year 93/19427 9/1993 (WO) patent term provisions of 35 U.S.C. 95/31069 11/1995 (WO) 154(a)(2). 96/30864 10/1996 (WO) 96/34466 10/1996 (WO) Under 35 U.S.C. 154(b), the term of this patent shall be extended for 0 days. OTHER PUBLICATIONS Appl. No.: 08/800,153 Article, “There’s more to one—Way addressability than meets (21) the eye”. (22) Filed: Feb. 13, 1997 Article, “VCR Technology”, No. 4 in a series of reports from Mitsubishi R&D, Video RevieW, Jan. 1989. (51) Int. Cl.7 .................................................... .. G06F 15/16 Article, “DIP II”, The Ultimate Program Guide Unit from the ultimate listings company. (52) US. Cl. ......................... .. 709/202; 709/217; 709/105 K. -
Unlocking Encryption: Information Security and the Rule of Law
Unlocking Encryption: Information Security and the Rule of Law BY DANIEL CASTRO AND ALAN MCQUINN | MARCH 2016 Advancements in the field of information security, particularly in how to Advances in use encryption to protect the confidentiality of information, have vastly information security could lead to tradeoffs improved security for consumers and businesses. But as products and in the effectiveness of services have become more secure, it has become harder for law law enforcement, but enforcement and national security agencies to access some information limiting encryption will that could help them prevent and investigate crimes and terrorism.1 This certainly make the has created one of the most difficult policy dilemmas of the digital age, as average consumer and business less secure. encryption both improves security for consumers and businesses and makes it harder for governments to protect them from other threats. There is no way to square this circle, so any choice will come with tradeoffs. However, ITIF believes that the U.S. government should not restrict or weaken encryption, because any attempts to do so would reduce the overall security of law-abiding citizens and businesses, make it more difficult for U.S. companies to compete in global markets, and limit advancements in information security. Moreover, attempts to restrict or weaken encryption would be ineffective at keeping this technology out of the hands of many criminals and terrorists. Cybersecurity is often portrayed as a never-ending arms race pitting those who wish to secure their computers and networks against attackers intent on breaking into their INFORMATION TECHNOLOGY & INNOVATION FOUNDATION | MARCH 2016 PAGE 1 systems.